cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-30383,https://securityvulnerability.io/vulnerability/CVE-2023-30383,Buffer Overflow Vulnerability in TP-LINK Archer Routers,"Certain TP-LINK Archer routers, specifically the Archer C50v2, Archer C20v1, and Archer C2v1, are susceptible to a buffer overflow vulnerability. When specifically crafted data is parsed, this vulnerability may result in a Denial of Service (DoS) condition, potentially disrupting the operation of the affected devices. Users should ensure their routers are updated to the latest firmware to mitigate the risk.",Tp-link,Archer C2 V1 Firmware,7.5,HIGH,0.0013899999903514981,false,false,false,true,true,false,false,2023-07-18T00:00:00.000Z,0 CVE-2017-8217,https://securityvulnerability.io/vulnerability/CVE-2017-8217,,"TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n have too permissive iptables rules, e.g., SNMP is not blocked on any interface.",Tp-link,C2 Firmware,5.3,MEDIUM,0.005419999826699495,false,false,false,false,,false,false,2022-10-03T16:23:06.000Z,0 CVE-2017-8219,https://securityvulnerability.io/vulnerability/CVE-2017-8219,,TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n allow DoSing the HTTP server via a crafted Cookie header to the /cgi/ansi URI.,Tp-link,C2 Firmware,6.5,MEDIUM,0.0008699999889358878,false,false,false,false,,false,false,2017-04-25T20:59:00.000Z,0 CVE-2017-8220,https://securityvulnerability.io/vulnerability/CVE-2017-8220,,"TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n allow remote code execution with a single HTTP request by placing shell commands in a ""host="" line within HTTP POST data.",Tp-link,C2 Firmware,9.9,CRITICAL,0.002529999939724803,false,false,false,false,,false,false,2017-04-25T20:59:00.000Z,0 CVE-2017-8218,https://securityvulnerability.io/vulnerability/CVE-2017-8218,,"vsftpd on TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n has a backdoor admin account with the 1234 password, a backdoor guest account with the guest password, and a backdoor test account with the test password.",Tp-link,C2 Firmware,9.8,CRITICAL,0.006169999949634075,false,false,false,false,,false,false,2017-04-25T20:59:00.000Z,0